zustand-store-ts

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill consists of a markdown file (SKILL.md) describing its purpose and usage, a TypeScript template file (assets/template.ts), and an acceptance criteria markdown file (references/acceptance-criteria.md).

  1. SKILL.md: This file provides instructions and examples for creating Zustand stores. It references the assets/template.ts file for users to copy. It does not contain any executable commands for the agent.
  2. assets/template.ts: This is a static TypeScript code template. It defines interfaces, initial state, and a Zustand store using create and subscribeWithSelector from the zustand library. The template includes a commented-out fetchItems() call, which is a placeholder for user implementation and does not perform any actual network requests or file operations as provided. The skill itself does not execute this TypeScript file; it is intended for the user to copy and adapt.
  3. references/acceptance-criteria.md: This file contains informational content about correct and incorrect Zustand patterns. It is purely documentation and does not contain any executable code or instructions for the agent.

Threat Assessment:

  • Prompt Injection: No patterns indicative of prompt injection were found in any of the files.
  • Data Exfiltration: No commands or code snippets were found that attempt to read sensitive files or exfiltrate data to external servers.
  • Obfuscation: No obfuscation techniques (e.g., Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected.
  • Unverifiable Dependencies: The skill itself does not install or download any external dependencies. The provided template code uses the zustand library, which is a well-known and trusted state management library. Users are expected to have this dependency installed in their own projects, but the skill does not manage this.
  • Privilege Escalation: No commands for privilege escalation (e.g., sudo, chmod 777, service installation) were found.
  • Persistence Mechanisms: No attempts to establish persistence (e.g., modifying shell configurations, creating cron jobs) were detected.
  • Metadata Poisoning: The metadata in SKILL.md is benign and accurately describes the skill's function.
  • Indirect Prompt Injection: The skill provides code templates. While the code generated by the skill could theoretically be used in a system susceptible to indirect prompt injection if it processes untrusted input, the skill itself does not process external data in a way that would lead to indirect prompt injection of the skill.
  • Time-Delayed / Conditional Attacks: No conditional logic for time-delayed or environment-specific attacks was found.

Conclusion: The skill is designed to provide a code template and documentation. It does not execute any code, perform system modifications, or interact with external resources in a malicious way. Therefore, it is deemed safe.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:24 AM